Latest Security Alerts

Stay updated on the latest security news that might affect the way you bank online.

Phishing Alert

Date: 21 June 2019

Description: We have detected SMSs impersonating DBS and POSB alerts in order to trick customers. These SMSes contain links to phishing sites mimicking DBS and POSB webpages and asking for email and SMS OTPs. If the requested information is provided, the customer’s access to their account and DBS’s Digital Token will be stolen and allow a fraudster to empty the customer’s bank account.





Who might be at risk?
DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Be alert and always verify the details in messages from DBS and POSB. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  2. Always type in the URL of DBS website directly into the address bar of your browser. If you are on mobile, consider using our official DBS or POSB Digibank applications.
  3. Never reply to unsolicited SMSs or emails. Responses to such SMSs or emails could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  4. DBS will never request for your PIN, password or OTP through phone call, email or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.
 

Alert Archives

Fake Bank Alert

Date: 22 May 2019 (first posted on 21 May 2019)

Description: We’ve detected fake banking websites purporting to be DBS Bank. When these pages are accessed, users will be prompted to either log in to their DBS account or provide other sensitive information under the guise of opening a DBS account.

Such websites are used to conduct advance fee fraud but may be utilized to steal personally identifiable data, username-password combinations, OTPs or infect a user’s device.




Who might be at risk?
DBS customers

How can you protect yourself from this?

  1. Be alert and always verify the details in messages from DBS and POSB. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  2. Always type the DBS or POSB websites URL directly into the address bar of your browser. If you are on mobile, consider using our official DBS or POSB Digibank applications.
  3. Never reply to unsolicited emails or SMSes. Responses to such emails or SMSes could be used by fraudsters to socially engineer information or trick users into performing unwanted actions. Verify that you’re speaking to our DBS experts by accessing our websites directly.
  4. DBS will never request for your PIN, password or OTP through phone call, email or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 15 April 2019

Description: We’ve noticed an increase in phishing emails and webpages targeting DBS and POSB customers. These phishing emails come from a non DBS email and asks for customers to reactivate their credit card by clicking on a link.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a page requesting for a user’s information, credit card number and CVV. Such websites are used to conduct card not present transactions but may also be utilized in order to steal personally identifiable data, username-password combinations, or trick users into conducting other unwanted actions.




Who might be at risk?
DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Be alert and always verify the details in messages from DBS and POSB. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  2. Always type the DBS or POSB websites URL directly into the address bar of your browser. If you are on mobile, consider using our official DBS or POSB Digibank applications.
  3. Only provide your credit card details if you're making a direct purchase. Always check that you intend to conduct a credit card transaction and do not provide an OTP to authorize payment if you are not.
  4. Never reply to unsolicited emails or SMSs. Responses to such emails or SMSs could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  5. DBS will never request for your PIN, password or OTP through phone call, email or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 08 February 2019

Description: We have detected phishing emails leading to phishing webpages targeting NUSS graduate members and requesting for sensitive details. Such phishing sites are designed to steal customer details, logins, PINs and credit card details in order to perform unauthorised, fraudulent transactions.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a non-DBS website.

Who might be at risk?
DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Be alert and always verify the details in messages from DBS and POSB. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  2. Always type the DBS or POSB websites URL directly into the address bar of your browser. . If you are on mobile, consider using our official DBS or POSB Digibank applications.
  3. Only provide your credit card details if you're making a direct purchase. Always check that you intend to conduct a credit card transaction and do not provide an OTP to authorize payment if you are not.
  4. Never reply to unsolicited emails or SMSs. Responses to such emails or SMSs could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  5. DBS will never request for your PIN, password or OTP through phone call, email or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 06 November 2018 (first posted on 21 Sept 2018)

Description: We have detected phishing SMSs leading to phishing webpages targeting customers and mimicking DBS and POSB’s Internet Banking login pages. Such phishing sites are designed to steal customer details, logins, PINs and OTPs in order to perform unauthorised, fraudulent transactions.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a non-DBS website.

Who might be at risk?
DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Be alert and always verify the details in messages from DBS and POSB. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  2. Always type in the URL of DBS website directly into the address bar of your browser.
  3. Check that you are using the official DBS or POSB websites. Always type the DBS or POSB websites URL directly into the address bar of your browser. If you are on mobile, consider using our official DBS or POSB Digibank applications.
  4. Never reply to unsolicited SMSs or emails. Responses to such SMSs or emails could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  5. DBS will never request for your PIN, password or OTP through phone call, email or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

SMS Alert

Date: 15 November 2018

Description: We have detected multiple SMS and online advertisements impersonating DBS or purporting to be from DBS. If a user clicks on the link, they will be redirected to a website purporting to be a cryptocurrency investment programme. Such websites are designed to trick users into conducting fraudulent bank transfers or credit card transactions.

Who might be at risk?
DBS Customers

How can you protect yourself from this?

  1. Be alert and always verify the details in messages from DBS and POSB. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  2. Always type in the URL of DBS website directly into the address bar of your browser.
  3. Check that you are using the official DBS or POSB websites. Always type the DBS or POSB websites URL directly into the address bar of your browser. If you are on mobile, consider using our official DBS or POSB Digibank applications.
  4. Never reply to unsolicited SMSs or emails. Responses to such SMSs or emails could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  5. DBS will never request for your PIN, password or OTP through phone call, email or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 03 October 2018 (first posted on 21 Sept 2018)

Description: We have detected phishing SMSs leading to phishing webpages targeting POSB customers and mimicking POSB’s Internet Banking login page. Such phishing sites are designed to steal customer details, logins, PINs and OTPs in order to perform unauthorised, fraudulent transactions.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a non-DBS website.

Who might be at risk?
DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Be alert and always verify the details in messages from DBS and POSB. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  2. Always type in the URL of DBS website directly into the address bar of your browser.
  3. Check that you are using the official DBS or POSB websites. Always type the DBS or POSB websites URL directly into the address bar of your browser. If you are on mobile, consider using our official DBS or POSB Digibank applications.
  4. Never reply to unsolicited SMSs or emails. Responses to such SMSs or emails could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  5. DBS will never request for your PIN, password or OTP through phone call, email or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 08 October 2018 (first posted on 03 Sept 2018)

Description: We have detected phishing emails and webpages targeting DBS customers. These phishing emails come from a spoofed DBS email address and requests customers click on a link to reactivate their credit card.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a page requesting for a user’s information, credit card number and CVV followed by a request to provide an SMS OTP. Such websites are used to conduct card not present transactions but may also be utilized in order to steal personally identifiable data, username-password combinations, OTPs or infect a user’s device.

Who might be at risk?
DBS and POSB iBanking customers

  1. Always check that you are using the official DBS website. Always type the DBS website URL (https://dbs.com) directly into the address bar of your browser.
  2. Only provide your credit card details if you’re making a direct purchase. Always check that you intend to conduct a credit card transaction and do not provide an OTP to authorize payment if you are not.
  3. Always verify the details in messages from DBS. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  4. Take note of any suspicious transactions. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.

Scam Alert

DBS Phishing Email Alert

Date: 15 August 2018 (first posted on 12 Dec 2017)
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected phishing emails targeting DBS cardholder customers and containing links to phishing websites. Such phishing sites are designed to steal the customer's credit card information in order to conduct fraudulent transactions.

If a customer falls victim to this phishing email and clicks on the malicious link, they will be redirected to a non-DBS website requesting for credit card details and an OTP. A sample website is seen below:

hxxps://dal-shared-22.hostwindsdns.com/~oxfotwtl/DBS

Sample of the phishing email pretending to be sent from DBS.

Who might be at risk?
Customers

How can you protect yourself from this?

  1. Always type the DBS website URL directly into the address bar of your browser.
  2. Check that you are using the official DBS iBanking site. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Date: 26 June 2018 (Updated 31 July 2018)

Description: We have detected multiple SMS and online advertisements impersonating DBS or purporting to be from DBS. If a user clicks on the link, they will be redirected to a website purporting to be a DBS investment programme. Such websites are designed to trick users into conducting fraudulent bank transfers or credit card transactions.





Who might be at risk?
DBS Customers

How can you protect yourself from this?

  1. Be alert. Minimize clicking on links in advertisements as these may not be legitimate.
  2. Check that you are using the official DBS website. Always type the DBS website URL directly into the address bar of your browser. If you are on mobile, consider using our official DBS Digibank applications.
  3. Never reply to unsolicited SMSs. Responses to such SMSs could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  4. Only provide your credit card details if you're making a direct purchase. Always check that you intend to conduct a credit card transaction and do not provide an OTP to authorize payment if you are not.
  5. DBS will never request for your PIN, password or OTP through phone call, email or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.

Phishing Alert

Date: 27 May 2018 (Updated 30 July 2018)

Description: We have detected phishing emails and webpages targeting DBS customers. These phishing emails comes from a non DBS email address and requests customers click on a link to unlock their iBanking account.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a page requesting for a user’s information, credit card number and CVV followed by a request to provide an SMS OTP. Such websites are used to conduct card not present transactions but may also be utilized in order to steal personally identifiable data, username-password combinations, OTPs or infect a user’s device.




Who might be at risk?

DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Always check that the email comes from a DBS address. DBS emails are sent from an @dbs.com email address.
  2. Check that you are using the official DBS website. Always type the DBS website URL directly into the address bar of your browser. You may also check that this is the official website by going to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Only provide your credit card details if you’re making a direct purchase. Always check that you intend to conduct a credit card transaction and do not provide an OTP to authorize payment if you are not.
  4. Always verify the details in messages from DBS.Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  5. Take note of any suspicious transactions. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.

Customer Advisory

Date: 20 July 2018

Description: SingHealth has reported a data breach affecting more than 1.5 million SingHealth patients. Patient data stolen included personally identifiable information such as names, addresses, birthdays, and NRIC numbers. Approximately 160,000 patients had details of medical prescriptions stolen.

Customers are advised to be alert. Stolen credentials may be used to conduct social engineering and phishing scams. Such scams utilize personally identifiable information to appear legitimate.

How can you protect yourself from this?

  1. Be alert. Do not provide personal or bank information to unsolicited callers.
  2. Never give out any sensitive personal information (including login passwords or one-time passwords) over the phone or via email. Our staff will never ask you for such information.
  3. Hang up and call DBS directly if you are in any doubt of a call, SMS or email’s validity. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you receive such calls.

Phishing Alert

Date: 19 June 2018

Description: We have detected a phishing website targeting DBS IDEAL customers and mimicking the DBS IDEAL login page. Such phishing sites are designed to steal customer details, logins, PINs and OTPs in order to perform fraudulent transactions.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a non-DBS website which requests for their Organisation ID, User ID and PIN. Once these details have been provided, customers are directed to a page requesting for the customer’s IB Secure PIN and redirected finally to a fake MAS webpage.




Who might be at risk?
DBS IDEAL customers

How can you protect yourself from this?

  1. Always type the DBS website URL directly into the address bar of your browser. If you are on mobile, consider using our official DBS IDEAL application.
  2. Never reply to unsolicited emails. Responses to such emails could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  3. Always verify the details in messages from DBS. Always check that the message reflects your intended actions.
  4. Customers are also encouraged to use the latest versions of internet browsers available. Using the latest browsers may provide advanced security features such as anti-phishing and forged website identification.
  5. Be Alert. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.

Malware Alert

Date: 12 June 2018

Description: There are emails impersonating DBS and claiming to be details of a SWIFT wire transfer. These emails have malicious files attached and opening these attachments may trigger an infection of a user’s device with Lokibot, an information-stealing trojan. Such malware is used to steal sensitive information, which may include banking credentials and credit card details.

Who might be at risk?
DBS Customers

How can you protect yourself from this?

  1. Be alert. Be careful when opening attachments if you have not verified its source or sender.
  2. Protect your computer by updating your PC regularly as well as using anti-virus and anti-spyware software that automatically updates daily.
  3. Never reply to unsolicited emails. Responding to such emails could be used by fraudsters to trick users into performing unwanted actions.
  4. Take note of any suspicious transactions. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.

Fake Bank Alert

Date: 08 June 2018

Description: We have detected a fake banking website targeting DBS Hong Kong customers. The fraudsters behind this website utilize email and/or voice messages in order to trick users into believing this is a legitimate DBS page. Once a user has landed on the page, they are prompted to provide their login PINs before being requested to perform a wire transfer.

Such websites are used to conduct advance fee fraud but may be utilized to steal personally identifiable data, username-password combinations, OTPs or infect a user’s device.

Who might be at risk?
HK DBS customers

How can you protect yourself from this?

  1. Always type in the URL of the DBS or POSB website directly into the address bar of your browser.
  2. Check that you are using the official DBS or POSB website. To do this, go to the address bar of your web browser and look for the "padlock" icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never give out any sensitive personal information (including login passwords or one-time passwords) over the phone or email. Our staff will never ask you for such information.
  4. Hang up and call DBS directly if you are in any doubt of the call’s validity. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you receive such calls.
  5. Take note of any suspicious transactions. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.
  6. Customers are also encouraged to use the latest versions of internet browsers available. Using the latest browsers may provide advanced security features such as anti-phishing and forged website identification. If such features are available.

Fake Bank Alert

Date: 30 May 2018

Description: We have detected a fake banking website targeting DBS customers. This fake bank mimics DBS’s webpage in order to trick customers. The fraudsters behind this website utilizes both email and voice to trick users into providing their personal information such as residential address and government issued ID numbers.

Such websites are used to conduct advance fee fraud but may be utilized to steal personally identifiable data, username-password combinations, OTPs or infect a user’s device.

Who might be at risk?
DBS and POSB customers

How can you protect yourself from this?

  1. Always type in the URL of the DBS or POSB website.directly into the address bar of your browser.
  2. Check that you are using the official DBS or POSB website. To do this, go to the address bar of your web browser and look for the "padlock" icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never give out any sensitive personal information (including login passwords or one-time passwords) over the phone or email. Our staff will never ask you for such information.
  4. Hang up and call DBS directly if you are in any doubt of the call’s validity. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you receive such calls.
  5. Take note of any suspicious transactions. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.
  6. Customers are also encouraged to use the latest versions of internet browsers available. Using the latest browsers may provide advanced security features such as anti-phishing and forged website identification. If such features are available.

Phishing Alert

Date: 27 May 2018

Description: We have detected phishing emails and webpages targeting DBS customers. These phishing emails comes from a non DBS email address and requests customers click on a link to unlock their iBanking account.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a page requesting for a user’s information, credit card number and CVV followed by a request to provide an SMS OTP. Such websites are used to conduct card not present transactions but may also be utilized in order to steal personally identifiable data, username-password combinations, OTPs or infect a user’s device.

Who might be at risk?
DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Always check that the email comes from a DBS address. DBS emails are sent from an @dbs.com email address.
  2. Check that you are using the official DBS website. Always type the DBS website URL directly into the address bar of your browser. You may also check that this is the official website by going to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Only provide your credit card details if you’re making a direct purchase. Always check that you intend to conduct a credit card transaction and do not provide an OTP to authorize payment if you are not.
  4. Always verify the details in messages from DBS. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  5. Take note of any suspicious transactions. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.

Phishing Alert

Date: 23 May 2018

Description: We have detected phishing websites targeting DBS and POSB customers and leading to a fake POSB Internet Banking login page.

Sample Websites are below:

hxxps://jungfernstieg[.]ga/secure/mas[.]go[.]com[.]sg/online insurance/posb/
hxxps://staromiejski[.]gq/secure/mas[.]go[.]com[.]sg/online
insurance/posb/
hxxps:// koepenicker[.]ml/secure/online insurance/mas[.]gov[.]com[.]sg/posb/index[.]html
hxxps:// kirchenplatz[.]ga/online insurance/mas[.]gov[.]com[.]sg/posb/index[.]html

Who might be at risk?
DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Always type in the URL of the DBS or POSB website directly into the address bar of your browser.
  2. Check that you are using the official DBS or POSB website. To do this, go to the address bar of your web browser and look for the "padlock" icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Take note of any suspicious transactions. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.
  4. Customers are also encouraged to use the latest versions of internet browsers available. Using the latest browsers may provide advanced security features such as anti-phishing and forged website identification. If such features are available.

SMS Phishing Alert

Date: 19 May 2018

Description: We have detected phishing SMSs leading to phishing webpages targeting DBS customers.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a page requesting for user ID and pin combinations as well as credit card number, expiration date and CVVs. Such websites are used to conduct card not present transactions but may also be utilized in order to steal personally identifiable data or promote fraudulent applications.

Who might be at risk?
DBS iBanking customers

How can you protect yourself from this?

  1. Be alert. Minimize clicking on links in SMSs as these may not be legitimate.
  2. Check that you are using the official DBS website. Always type the DBS website URL directly into the address bar of your browser. If you are on mobile, consider using our official DBS Digibank applications.
  3. Never reply to unsolicited SMSs. Responses to such SMSs could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  4. DBS will never request for your PIN, password or OTP through phone call, email or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.

DBS Phishing Email Alert

Date: 13 May 2018 (first posted on 12 Dec 2017)
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected phishing emails targeting DBS cardholder customers and containing links to phishing websites. Such phishing sites are designed to steal the customer's credit card information in order to conduct fraudulent transactions.

If a customer falls victim to this phishing email and clicks on the malicious link, they will be redirected to a non-DBS website requesting for credit card details and an OTP. A sample website is seen below:

hxxp[:]//dal-business-28.hostwindsdns.com/~bezakhja
hxxp[:]//yepnim.estate
hxxp[:]//hwsrv-269164.hostwindsdns.com
hxxp[:]//dal-business-28.hostwindsdns.com/~cpbvpoaf
hxxps[:]//sea-business-16[.]hostwindsdns[.]com/~hmzofvdj/
hxxp[:]//mohdyasin[.]tech/amstel/

Sample of the phishing email pretending to be sent from DBS.

Who might be at risk?
Customers

How can you protect yourself from this?

  1. Always type the DBS website URL directly into the address bar of your browser.
  2. Check that you are using the official DBS iBanking site. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 10 May 2018

Description: We have detected a phishing email and website targeting DBS customers and leading to a fake DBS Internet Banking login page. Such phishing sites are designed to steal customer details, logins, PINs and OTPs in order to perform fraudulent transactions.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a non-DBS website. Post login, the phishing page requests for an OTP before prompting for the customer to wait for fifteen minutes

Sample Websites are below:

hxxp://190[.]14[.]38[.]131/itssl/?ln=activate.dbs&tk=

hxxp://activate[.]dbs[.]online-client[.]services/?tk=

Who might be at risk?
DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Always type in the URL of the DBS or POSB website directly into the address bar of your browser.
  2. Check that you are using the official DBS or POSB website. To do this, go to the address bar of your web browser and look for the "padlock" icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Responses to such emails could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  4. DBS will never request for your PIN, password or OTP through a phone call or SMS. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.
  5. Customers are also encouraged to use the latest versions of internet browsers available. Using the latest browsers may provide advanced security features such as anti-phishing and forged website identification. If such features are available.

Phishing Alert

Date: 30 April 2018

Description: We have detected a phishing email and webpages targeting DBS customers. These phishing emails came from a non DBS email address and purport to be an official DBS survey.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a page purporting to be an official DBS survey and requesting for a user’s information, credit card number and CVV followed by a request to provide an SMS OTP. Such websites are used to conduct card not present transactions but may also be utilized in order to steal personally identifiable data, username-password combinations, OTPs or infect a user’s device.

Who might be at risk?
DBS iBanking customers

How can you protect yourself from this?

  1. Always type in the URL of the DBS or POSB website directly into the address bar of your browser.
  2. Check that you are using the official DBS website. Always type the DBS website URL directly into the address bar of your browser. You may also check that this is the official website by going to the address bar of your web browser and look for the "padlock" icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Always verify the details in messages from DBS. Always check that the message reflects your intended actions and do not proceed or authorize suspicious transactions.
  4. Never reply to unsolicited emails. Responses to such emails could be used by fraudsters to socially engineer information or trick users into performing unwanted actions.
  5. Customers are also encouraged to use the latest versions of internet browsers available. Using the latest browsers may provide advanced security features such as anti-phishing and forged website identification. If such features are available.

Phishing Alert

Date: 03 May 2018
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected a phishing website targeting POSB customers and mimicking POSB Internet Banking login page. Such phishing sites are designed to steal customer details, logins, PINs and OTPs in order to perform fraudulent transactions.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a non-POSB website.

Sample Websites are below:

hxxp[:]//dal-business-28.hostwindsdns.com/~bezakhja
hxxp[:]//yepnim.estate
hxxp[:]//hwsrv-269164.hostwindsdns.com
hxxp[:]//dal-business-28.hostwindsdns.com/~cpbvpoaf
hxxps[:]//sea-business-16[.]hostwindsdns[.]com/~hmzofvdj/
hxxp[:]//mohdyasin[.]tech/amstel/

Who might be at risk?
DBS and POSB iBanking customers

How can you protect yourself from this?

  1. Always type in the URL of the DBS or POSB website directly into the address bar of your browser.
  2. Check that you are using the official DBS or POSB website. To do this, go to the address bar of your web browser and look for the "padlock" icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 30 April 2018
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected a phishing email targeting DBS customers. These phishing emails came from a non DBS email address and purport to be an official DBS survey. Such emails often link to malicious pages in order to steal personally identifiable data, username-password combinations, OTPs or infect a user’s device.

Who might be at risk?
DBS iBanking customers

How can you protect yourself from this?

  1. Always check that the email comes from a DBS address. DBS emails are sent from an @dbs.com email address.
  2. Check that you are using the official DBS website. Always type the DBS website URL directly into the address bar of your browser. You may also check that this is the official website by going to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phone Scam Alert

Date: 02 April 2018
Threat Type: Phishing Calls / Vishing
Alert Level: Amber
Criticality: Low

Description: We have detected a phishing campaign targeting DBS customers and Singaporean residents with automated phone calls. These calls claim that a customer’s account is disabled and request for the customer to follow a sequence of instructions before being routed to an individual impersonating a DBS staff member.

Such phone scams are designed to trick customers into divulging sensitive information such as logins, PINs, OTPs or credit card details or to conduct advance fee fraud.

Who might be at risk?
DBS iBanking customers

How can you protect yourself from this?

  1. Be alert. Do not provide personal or bank information to unsolicited callers.
  2. Never give out any sensitive personal information (including login passwords or one-time passwords) over the phone or via email. Our staff will never ask you for such information.
  3. Hang up and call DBS directly if you are in any doubt of the call’s validity. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you receive such calls.

Phishing Alert

Date: 23 March 2018
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected a phishing website targeting DBS customers and mimicking DBS’s Internet Banking login page. Such phishing sites are designed to steal customer details, logins, PINs, OTPs and credit card details in order to perform unauthorised, fraudulent transactions.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a non-DBS website.

Sample of the phishing email pretending to be sent from DBS.

Who might be at risk?
DBS iBanking customers

How can you protect yourself from this?

  1. Always type in the URL of DBS website directly into the address bar of your browser.
  2. Check that you are using the official DBS website. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 08 March 2018
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected phishing emails being sent to DBS customers informing them of a ‘login format change’ and requesting them to click on a link to update their details. Once the link is clicked, the customer will be redirected to a phishing site asking for his iBanking login ID, password, credit card, and other personal information. Such information may then be used by the attacker to perform fraudulent transactions.

A sample website is seen below:

URL: hxxp[:]//190.14.38.22:8443/redirect.secure-forms[.]com/?id=xqgkhox6u6gk35o7eofuwvp0pv9s007v&url=online.dbs
Redirect to: hxxps[:]//online.dbs.secure-form[.]services/?id=xqgkhox6u6gk35o7eofuwvp0pv9s007v

Sample of the phishing email pretending to be sent from DBS.

Who might be at risk?
DBS iBanking customers

How can you protect yourself from this?

  1. Always type in the URL of DBS website directly into the address bar of your browser.
  2. Check that you are using the official DBS website. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 27 January 2018
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected a phishing website targeting DBS customers and mimicking DBS’s Internet Banking login page. Such phishing sites are designed to steal customer details, logins, PINs and OTPs in order to perform unauthorised, fraudulent transactions.

If a customer falls victim to the phishing email and clicks on the link, they will be redirected to a non-DBS website.


Who might be at risk?
DBS iBanking customers

How can you protect yourself from this?

  1. Always type in the URL of DBS website directly into the address bar of your browser.
  2. Check that you are using the official DBS website. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Malware Alert

Date: 23 January 2018
Threat Type: Malware
Alert Level: Amber
Criticality: Low

Description: There are emails with malicious attachments and links being circulated to banking customers. These emails claim to represent DBS and are disguised as a "Payment on behalf of customer" and informing recipients that they have received a deposit. These emails may contain malicious attachments and links. Opening these links and attachments trigger malware designed to steal passwords and other personal information, and virtual currencies found in wallets on PCs.

See sample of the email below. Customers are assured that DBS is not the source of this email and are reminded not to click on attachments from suspicious origin. Do not open attachments with the extension name ‘.exe’ or ‘.ace’. DBS will never send executable files (.exe) or Ace Compressed Archive (.ace) files to its customers.

Who might be at risk?
Customers with iBanking accounts

How can you protect yourself from this?

You are reminded to remain cautious when banking online:

  1. Be careful when opening attachments (especially files with extension name ‘exe’ and ‘ace’) if you have not verified its source or sender. Remember that DBS will never send executable or Ace Compressed Archive files to its customers.
  2. Protect your computer by using anti-virus and anti-spyware software that are set to perform automatic updates daily.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Mobile Malware Alert

Date: 21 Dec 2017
Threat Type: Android malware - Catelites
Alert Level: Amber
Criticality: Low

Description: We've discovered a new variant of Catelites malware that may affect users of DBS and POSB mobile applications such as:

  • DBS digibank
  • POSB digibank
  • DBS IDEAL
  • DBS digibank India
  • DBS PayLah!
  • DBS mBanking Hong Kong
  • DBS mBanking
  • POBS mBanking
  • DBS Quick Credit
  • DBS Marketwatch HK
  • DBS Loans HK
  • DBS Compass Rewards



This malware targets users using Android mobile devices and first installs an app called System Application before masquerading as a fraudulent Gmail, Google Play, and Chrome application. This malware could be spread through other malicious apps, third party mobile websites, and malicious advertising on sites or in games.

Once the application is installed, System Application repeatedly requests for administrator permissions and for System Application as the default messaging app until granted. After permissions are given, the application downloads fraudulent Gmail, Google Play, and Chrome applications while displaying a permanent notification in Android’s notification screen to log into the user’s banking account.

Signs of an infected mobile device may include (but are not limited to) the following:

  • Unusual disruptions to a mobile device’s performance;
  • Permanent notifications requesting for a specific action;
  • Application asking for special permissions that the application should not need, such as screen capture permissions or assigning the application as the default SMS app;
  • Sudden device shutdown;
  • Inability to remove the Trojan from the administrator list or from the device without being in safe boot.

Victims might see the following after being prompted to download and install the malware:

  1. Pop-up screens appear prompting the victim to install an application. The application requests for administrator permissions and prevents the user from using the device until the appropriate permissions are granted.
  2. Once the application has control of the device, legitimate applications may have a fake overlay placed on top to steal the victim’s bank login requests and credit card details. This page may appear to be legitimate.
  3. Missing OTPs after an appropriate wait for a bank OTP - OTPs sent to the infected device are hijacked, sent to the malicious attacker before being deleted, compromising the user’s bank details.

Who might be at risk?
Customers using DBS and POSB’s mobile applications

How can you protect yourself from this?

Victims of Catelites are advised to perform a factory reset of their device.

However, if you are unable to perform the reset, you may wish to perform the following actions:

  1. Boot your Android device into safe mode
  2. Go to the list of administrators and remove administrative permissions from the Trojan.
  3. Restart the device and conduct an anti-virus scan using a reputable, official anti-virus provider.
  4. Check to ensure that the malware has been removed from your device.

DBS and POSB digibank applications remain secure and are not the source of this malware. You are reminded to remain cautious when banking online:

  1. Be alert. Do not provide your user ID or pin and other sensitive information if you did not initiate any activity. Be cautious especially if a screen on your mobile device suddenly pops up and asks for your information, even if you did not open your applications or initiate any activity.
  2. Install the latest software updates on your mobile devices. When installing applications, be mindful of the permissions granted (i.e. think if the permissions are really necessary).
  3. Do not download or install any applications on your mobile device unless they are from authentic sources (Apple App Store or Google Play Store). If you are prompted to install any applications or plugins outside of the authentic stores, it is strongly recommended that to search within the authentic stores for that application.
  4. Do not enter any challenge code into your security device if you did not perform any financial transaction(s) in your account. Please note that during the login process, DBS will never ask for "Sign 1" of your iBSecure Device nor ask you to input a Challenge/Response.
  5. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.

DBS Phishing Email Alert

Date: 12 Dec 2017
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected phishing emails targeting DBS cardholder customers and containing links to phishing websites. Such phishing sites are designed to steal the customer's credit card information in order to conduct fraudulent transactions.

If a customer falls victim to this phishing email and clicks on the malicious link, they will be redirected to a non-DBS website requesting for credit card details and an OTP. A sample website is seen below:

hxxps://dal-shared-22.hostwindsdns.com/~oxfotwtl/DBS

Sample of the phishing email pretending to be sent from DBS.

Who might be at risk?
Customers

How can you protect yourself from this?

  1. Always type the DBS website URL directly into the address bar of your browser.
  2. Check that you are using the official DBS iBanking site. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

DBS Malicious Email Alert

Date: 07 Nov 2017
Threat Type: Malware/Phishing
Alert Level: Amber
Criticality: Low

Description: There are emails with malicious attachments and links being circulated to banking customers. These emails claim to represent DBS and are disguised as “Transaction Advice” emails. These emails contain a malicious zip file with a .jar, .exe or .ace file within. Opening the attachments trigger malware designed to steal passwords, personal information, or financial information.

Sample of the phishing email pretending to be sent from DBS.

Who might be at risk?
Customers

How can you protect yourself from this?

You are reminded to remain cautious when banking online:

  1. Be careful when opening attachments (especially files with extension name ‘zip’, ‘jar’, ‘exe’ and ‘ace’) if you have not verified its source or sender. Remember that DBS will never send executable or ace compressed archive files to its customers.
  2. Protect your computer by using anti-virus and anti-spyware software and update them daily.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Mobile Malware Alert

Date: 03 August 2017
Threat Type: Android malware - BankBot
Alert Level: Amber
Criticality: Low

Description: We've discovered a new variant of Bankbot malware that may affect users of the following DBS and POSB mobile applications:

  • DBS Digibank
  • POSB Digibank
  • DBS PayLah
  • DBS mBanking Hong Kong
  • DBS Business Class
  • DBS Quick Credit

This malware targets users using Android mobile devices and often masquerades as a legitimate sounding application such as Adobe Flash Player, Play Market Update, MMS Flash Player or Game Launcher. This malware could be spread through other malicious apps, websites, and malicious advertising on sites or in games, which prompts a user to download and install the application.

Once the application is installed, it requests for Google Accessibility Services permissions, begins to capture the user’s screen as well as forcing the victim to use it as the default SMS application. This malware is also able to grant itself new accesses without user intervention and prevents users from removing its administration permissions or uninstalling it.

Signs of an infected mobile device may include (but are not limited to) the following:

  • Unusual disruptions to a mobile device’s performance;
  • Application asking for special permissions that the application should not need, such as screen capture permissions or assigning the application as the default SMS app
  • Sudden device shutdown
  • Inability to remove the Trojan from the administrator list or from the device without being in safe boot

Victims might see the following after being prompted to download and install the malware:

  1. Pop-up screens appear prompting the victim to install an application. The application requests for Google Service permissions as well as administrator permissions prevents the user from using the device until the appropriate permissions are granted.
  2. Once the application has control of the device, legitimate applications may have a fake overlay placed on top to steal the victim’s bank login requests. This page may appear to be legitimate. The malicious application may insert fake pages to steal a victim’s information such as mobile numbers, bank card details or passwords.
  3. Missing OTPs after an appropriate wait for a bank OTP - OTPs sent to the infected device are hijacked, sent to the malicious attacker before being deleted, compromising the user’s bank details.

Who might be at risk?
Customers using DBS and POSB’s mobile applications

How can you protect yourself from this?

Victims of Bankbot are advised to perform a factory reset of their device.

However, if you are unable to perform the reset, you may wish to perform the following actions:

  1. Boot your Android device into safe mode
  2. Go to the list of administrators and remove administrative permissions from the Trojan.
  3. Restart the device and conduct an anti-virus scan using a reputable, official anti-virus provider.
  4. Check to ensure that the malware has been removed from your device.

DBS and POSB digibank applications remain secure and are not the source of this malware. You are reminded to remain cautious when banking online:

  1. Be alert. Do not provide your user ID or pin and other sensitive information if you did not initiate any activity. Be cautious especially if a screen on your mobile device suddenly pops up and asks for your information, even if you did not open your applications or initiate any activity.
  2. Install the latest software updates on your mobile devices. When installing applications, be mindful of the permissions granted (i.e. think if the permissions are really necessary).
  3. Do not download or install any applications on your mobile device unless they are from authentic sources (Apple App Store or Google Play Store). If you are prompted to install any applications or plugins outside of the authentic stores, it is strongly recommended that to search within the authentic stores for that application.
  4. Do not enter any challenge code into your security device if you did not perform any financial transaction(s) in your account. Please note that during the login process, DBS will never ask for "Sign 1" of your iBSecure Device nor ask you to input a Challenge/Response.
  5. Call us immediately at 1800 222 2222 (Business Banking), if you notice unknown transactions appearing on your account.

Malware Alert

Date: 03 July 2017
Threat Type: Malware
Alert Level: Amber
Criticality: Low

Description: There are emails with malicious attachments and links being circulated to banking customers. These emails claim to represent DBS and are disguised as “Bank Fund Transfers”. These emails contain malicious attachments and links. Opening these links and attachments trigger malware designed to steal passwords and other personal information, and virtual currencies found in wallets on PCs.

See sample of the email below. Customers are assured that DBS is not the source of this email and are reminded not to click on attachments from suspicious origin. Do not open attachments with the extension name ‘.exe’ or ‘.ace’. DBS will never send executable files (.exe) or Ace Compressed Archive (.ace) files to its customers.

Who might be at risk?
Customers

How can you protect yourself from this?

You are reminded to remain cautious when banking online:

  1. Be careful when opening attachments (especially files with extension name ‘exe’ and ‘ace’) if you have not verified its source or sender. Remember that DBS will never send executable or ace compressed archive files to its customers.
  2. Protect your computer by using anti-virus and anti-spyware software and update them daily.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Fake Bank Alert

Date: 30 June 2017
Threat Type: Fake Bank
Alert Level: Green
Criticality: Low

Description: We have detected a fake banking website purporting to be DBS Bank. This fake bank used DBS’s name, logo and images. Such sites are designed to trick customers into providing their personal information and banking credentials or to conduct advance fee fraud scams.

Customers are advised that this website is not a legitimate DBS website.

Who might be at risk?
DBS customers

How can you protect yourself from this?

  1. Always type in the URL of DBS website directly into the address bar of your browser..
  2. Check that you are using the official DBS website. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2222 (Business Banking), if you receive any DBS emails which you are unsure of. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.
Please inform our customer centre at 1800 111 1111 or +65 6327 2265 (when calling from overseas) immediately if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 12 May 2017
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected phishing emails targeting DBS IDEAL customers and containing links to phishing websites posing as DBS IDEAL’s website. Such phishing sites are designed to steal the customer's login and authorisation credentials (such as Organisation ID, User ID, PIN, and Security Access Code) and other information to perform unauthorised, fraudulent transactions.

If the customer falls victim to the phishing email and clicks on the link, they will be redirected to a non-DBS website. A sample website is seen below:

hxxp://www.craig-hallum[.]ga/sgg/1/login[.]htm

Customers are assured that the DBS IDEAL website remains secure.

Who might be at risk?
DBS IDEAL customers

How can you protect yourself from this?

  1. Always type the DBS website URL directly into the address bar of your browser.
  2. Check that you are using the official DBS IDEAL site. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2222 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.
Please inform our customer centre at 1800 111 1111 or +65 6327 2265 (when calling from overseas) immediately if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 21 March 2017
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected a phishing site attempting to obtain customer’s credit card details. Such sites trick customers into providing their account and credit card details, including credit card expiry dates and CVVs. Such information may be used to perform Card Not Present Transactions.

A customer will see the following page if they are tricked into visiting this website:

Customers are assured that the DBS Internet Banking and DBS IDEAL websites remain secure.

Who might be at risk?
DBS credit and debit card customers

How can you protect yourself from this?

  1. Always type in the URL of DBS website directly into the address bar of your browser.
  2. Check that you are using the official DBS IDEAL site. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2222 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.
Please inform our customer centre at 1800 111 1111 or +65 6327 2265 (when calling from overseas) immediately if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Fake Bank Alert

Date: 02 March 2017
Threat Type: Fake Bank
Alert Level: Green
Criticality: Low

Description: We have detected a fake banking website purporting to be DBS Bank. This fake bank used DBS’s name, logo and images. Such sites are designed to trick customers into providing their personal information and banking credentials or to conduct advance fee fraud scams.

Customers are advised that this website is not a legitimate DBS website.



Who might be at risk?
DBS customers

How can you protect yourself from this?

  1. Always type in the URL of DBS website directly into the address bar of your browser.
  2. Check that you are using the official DBS website. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2222 (Business Banking), if you receive any DBS emails which you are unsure of. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.
Please inform our customer centre at 1800 111 1111 or +65 6327 2265 (when calling from overseas) immediately if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Malware Alert

Date: 31 January 2017
Threat Type: Malware
Alert Level: Amber
Criticality: Low

Description: There are emails with malicious attachments and links being circulated to banking customers. These emails claim to represent DBS and is disguised as a "bank transfer email" informing recipients that they received a deposit. These emails may contain malicious attachments and links. Opening these links and attachments trigger malware designed to steal passwords and other personal information, and virtual currencies found in wallets on PCs.

The common subjects used in the email include the following:

  • Online wire transfer payment notification
  • Payment update
  • Swift copy
  • Wire Transfer Payment

See sample of the email below. Customers are assured that DBS is not the source of this email and are reminded not to click on attachments from suspicious origin. Do not open attachments with the extension name ‘.exe’ or ‘.ace’. DBS will never send executable files (.exe) or Ace Compressed Archive (.ace) files to its customers.

Phishing email

Phishing email

Who might be at risk?
Customers with iBanking accounts

How can you protect yourself from this?

You are reminded to remain cautious when banking online:

  1. Be careful when opening attachments (especially files with extension name ‘exe’ and ‘ace’) if you have not verified its source or sender.Remember that DBS will never send executable or ace compressed archive files to its customers.
  2. Protect your computer by using anti-virus and anti-spyware software that are set to perform automatic updates daily.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2222 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Malware Alert

Date: 23 February 2017
Threat Type: Malware (Trickbot)
Alert Level: Amber
Criticality: Low

Description: We have discovered a new variant of Trickbot malware that may affect users of the DBS Internet Banking and DBS IDEAL website. This malware is spread through phishing emails with malicious attachments or through malicious online advertisements. When the said malicious attachment or online advertisement is opened or viewed, the malware infects the customers’ computers or devices.

Once customers’ computers or devices are infected, the malware will overlay itself on the official DBS and DBS IDEAL pages in an attempt to steal the customers’ login and authorisation credentials such as User ID, PIN, DBS iB Secure PIN, SMS OTP. If you see any suspicious requests for information from the DBS portal, your computer or device may be infected with this malware. You are advised not to proceed with any transactions until your computer or device has been checked and disinfected.

Users may experience slow page loading and see a “Please wait…” message after clicking on the login button.

A sample of a “Please wait…” message on DBS Internet Banking and DBS IDEAL

Phishing email

Phishing email

Customers are assured that the DBS Internet Banking and DBS IDEAL websites remain secure and are not the source of this malware.

Who might be at risk?
iBanking or IDEAL customers

How can you protect yourself from this?

  1. Be alert. Do not download or open attachments found in suspicious emails and do not reply to the suspicious sender.
  2. Protect your computer by using anti-virus and anti-spyware software that are set to perform automatic updates daily.
  3. Validate your actions. DBS will never ask for “Sign 1” of your iB Secure Device nor input a Challenge/Response. Never enter a challenge code into your security device if you have not performed any financial actions in your account and always validate that messages you’ve received reflect your actual transaction requests. For example, check that the account number is correct.
Please inform our customer centre at 1800 111 1111 or +65 6327 2265 (when calling from overseas) immediately if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Malware Alert

Date: 31 January 2017
Threat Type: Malware
Alert Level: Amber
Criticality: Low

Description: There are emails with malicious attachments and links being circulated to banking customers. These emails claim to represent DBS and is disguised as a "bank transfer email" informing recipients that they received a deposit. These emails may contain malicious attachments and links. Opening these links and attachments trigger malware designed to steal passwords and other personal information, and virtual currencies found in wallets on PCs.

The common subjects used in the email include the following:

  • Online wire transfer payment notification
  • Payment update
  • Swift copy
  • Wire Transfer Payment

See sample of the email below. Customers are assured that DBS is not the source of this email and are reminded not to click on attachments from suspicious origin. Do not open attachments with the extension name ‘.exe’ or ‘.ace’. DBS will never send executable files (.exe) or Ace Compressed Archive (.ace) files to its customers.

Phishing email

Phishing email

Who might be at risk?
Customers with iBanking accounts

How can you protect yourself from this?

You are reminded to remain cautious when banking online:

  1. Be careful when opening attachments (especially files with extension name ‘exe’ and ‘ace’) if you have not verified its source or sender.Remember that DBS will never send executable or ace compressed archive files to its customers.
  2. Protect your computer by using anti-virus and anti-spyware software that are set to perform automatic updates daily.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2222 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Phishing Alert

Date: 06 February 2017
Threat Type: Phishing
Alert Level: Amber
Criticality: Low

Description: We have detected a phishing emails targeting DBS IDEAL customers and containing links to phishing websites posing as DBS IDEAL’s website. Such phishing sites are designed to steal the customer's login and authorization credentials (such as Organization ID, User ID, PIN, and Security Access Code) and other information to perform unauthorized, fraudulent transactions.

If the customer falls victim to the phishing email and clicks on the link, they will be redirected to any of the phishing websites below:

hxxp://logistik[.]gr/dbop/1/login[.]htm

hxxp://tugill[.]com/wz/1/login[.]htm

hxxp://howtomastersite[.]com/zpp/2/login[.]htm

hxxp://pearlscorniche[.]com/yg/1/login[.]htm

hxxp://rimemagic[.]com/mmp/1/login[.]htm

Phishing email

Phishing email

Phishing email

Phishing email

Who might be at risk?
DBS IDEAL customers

How can you protect yourself from this?

  1. Always type in the URL of DBS website directly into the address bar of your browser.
  2. Check that you are using the official DBS IDEAL site. To do this, go to the address bar of your web browser and look for the “padlock” icon. When you click on the icon, a window should appear confirming that VeriSign has identified that the certificate is issued to DBS.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2222 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.
Please inform our customer centre at 1800 111 1111 or +65 6327 2265 (when calling from overseas) immediately if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.

Malware Alert

Date: 31 January 2017
Threat Type: Malware
Alert Level: Amber
Criticality: Low

Description: There are emails with malicious attachments and links being circulated to banking customers. These emails claim to represent DBS and is disguised as a "bank transfer email" informing recipients that they received a deposit. These emails may contain malicious attachments and links. Opening these links and attachments trigger malware designed to steal passwords and other personal information, and virtual currencies found in wallets on PCs.

The common subjects used in the email include the following:

  • Online wire transfer payment notification
  • Payment update
  • Swift copy
  • Wire Transfer Payment

See sample of the email below. Customers are assured that DBS is not the source of this email and are reminded not to click on attachments from suspicious origin. Do not open attachments with the extension name ‘.exe’ or ‘.ace’. DBS will never send executable files (.exe) or Ace Compressed Archive (.ace) files to its customers.

Phishing email

Phishing email

Who might be at risk?
Customers with iBanking accounts

How can you protect yourself from this?

You are reminded to remain cautious when banking online:

  1. Be careful when opening attachments (especially files with extension name ‘exe’ and ‘ace’) if you have not verified its source or sender.Remember that DBS will never send executable or ace compressed archive files to its customers.
  2. Protect your computer by using anti-virus and anti-spyware software that are set to perform automatic updates daily.
  3. Never reply to unsolicited emails. Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2222 (Business Banking), if you notice unknown transactions appearing on your account. Customers are also encouraged to use the latest versions of internet browsers available, which may provide advanced security features such as anti-phishing and forged website identification. If such features are available, customers are advised to turn them on.
 

Security Tips

Be proactive in safeguarding your information as you bank online. Check out these security tips to protect yourself from being a victim of online threats.

Adapt these security practices

Protect your DBS accounts

Make sure only you have access to your DBS account in order to prevent unauthorized transactions and actions.

  • Keep your username and password private and never share these details with others.
  • Avoid registering other people’s biometrics such as facial or fingerprint registration on your devices if you use biometrics to access DBS applications.
  • Avoid sharing personal details unnecessarily.
  • Avoid providing your DBS account details (such as passwords and pins) in third-party financial aggregator applications as these applications may not be secure.
  • Always pay attention to SMS and authentication prompts to ensure you’re approving the correct action.
  • Use a unique password for your DBS logins.

Protect your personal devices

Keep your devices are secure and up-to-date to help prevent scammers from infecting your device with malware.

  • Always ensure that your computers and mobile devices are updated to the latest security patch.
  • If available for your device, install and keep your antivirus software updated.
  • Enable automatic updates for your operating systems and antivirus.

Stay alert

Always Stop, THINK, before you Act!

  • Verify that messages you receive come from DBS through one of our official channels.
  • Check your credit statements on a frequent basis.
  • Always go to our website by typing https://www.dbs.com/ to ensure you’re reaching DBS’s website.
  • Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.


Beware of these online threats

Social Engineering

Scammers may use social engineering to trick you into giving them your personal or financial information. There are many types of social engineering such as phishing, social media impersonation.

Phishing

Phishing may come in through email, SMS or a phone call and often purport to be legitimate or appear to come from someone familiar. These types of phishing may try to persuade you to disclose sensitive information, perform unwanted transactions, or click on malicious links or attachments.

If you fall victim, scammers may be able to steal personal information, bank logins and OTPs, or download and install malware to steal such information.

  • Be careful of unsolicited emails, SMSs and phone calls and avoid responding to them.
  • Avoid clicking on links in unsolicited emails and SMSs. Go directly to our website at https://www.dbs.com/security to view the latest alerts. Always access our services through our official website  https://www.dbs.com/.
  • If you receive phone calls purporting to be from DBS, ask to call back and call our official phone line to verify.
  • Use our mobile applications from the official Apple App store, Google Play store or other DBS authorized stores instead of using a web browser.
  • Call us immediately at 1800 111 1111 (Personal Banking) or 1800 222 2200 (Business Banking), if you notice unknown transactions appearing on your account.

Business Email Compromise Scams (BEC Scams)

BEC Scams are a subset of phishing scams. These are sent to unsuspecting employees and purport to be high-ranking executives, managers, or familiar parties such as a known business. Such emails may request an employee to conduct unauthorized wire transfers, open malicious links or attachments, or send sensitive information.

In certain cases, the scammer may use this to compromise an employee’s mailbox and use the official mailbox to impersonate the employee.

  • Verify such requests through official contact numbers or channels. Do not reply to the email or use any provided contacts within the email.
  • Only act on expected instructions and double check before acting.
  • If available, enable email labelling to distinguish between outside parties and utilize colour coding to visually identify emails from external parties.

Social Media Impersonation

Social media impersonations work by pretending to be official and legitimate pages or people. These may attempt to trick you into performing unwanted actions such as adding them to your social media network, clicking on malicious links or disclosing sensitive information.

Scammers may attempt to hijack communications between yourself and DBS by using official sounding usernames and responding directly to your posts.

  • Ensure that you’re communicating directly with official DBS accounts on social media, especially when asking for assistance.
  • Avoid giving your sensitive or personal details to accounts you can’t verify as being official DBS accounts.
  • Be careful of the information you share online. Avoid sharing images or details of your bank statements, credit cards, and username and PIN combinations.
  • Limit the information unknown parties may see through the sharing privacy options on social media.

 

Malware

Malware or malicious software is designed to gain access to your devices without your consent. Malware may be installed by opening a malicious document (e.g. pdfs, word and excel documents), visiting a malicious link, or installing a malware-laden program or app. After being installed, such malware may steal your personal and financial data or utilize your device to conduct other malicious activities.

  • Be careful of attachments and links received in emails and avoid opening attachments and links in unsolicited emails or SMSes.
  • Avoid downloading unneeded programs or apps as these may contain malware.
  • Avoid using third-party app stores as unknown parties can modify such apps to include malware. Only download DBS apps from the official Apple App store, Google Play store or other DBS authorized stores.
  • Always ensure that your computers and mobile devices software and anti-virus are kept up-to-date.